Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Algorithm 5

De algorithm.
Input: ID′, R
Output: R
(1)i = ID′;
(2)R = , , …,  + R′;
(3)Return R